Search results for: water security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11263

Search results for: water security

10903 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 398
10902 Characterization of Plunging Water Jets in Crossflows: Experimental and Numerical Studies

Authors: Mina Esmi Jahromi, Mehdi Khiadani

Abstract:

Plunging water jets discharging into turbulent crossflows are capable of providing efficient air water interfacial area, which is desirable for the process of mass transfer. Although several studies have been dedicated to the air entrainment by water jets impinging into stagnant water, very few studies have focused on the water jets in crossflows. This study investigates development of the two-phase flow as a result of the jet impingements into crossflows by means of image processing technique and CFD simulations. Investigations are also conducted on the oxygen transfer and a correlation is established between the aeration properties and the oxygenation capacity of water jets in crossflows. This study helps the optimal design and the effective operation of the industrial and the environmental equipment incorporating water jets in crossflows.

Keywords: air entrainment, CFD simulation, image processing, jet in crossflow, oxygen transfer, two-phase flow

Procedia PDF Downloads 238
10901 Water Depth and Optical Attenuation Characteristics of Natural Water Reservoirs nearby Kolkata City Assessed from Hyperion Hyperspectral and LISS-3 Multispectral Images

Authors: Barun Raychaudhuri

Abstract:

A methodology is proposed for estimating the optical attenuation and proportional depth variation of shallow inland water. The process is demonstrated with EO-1 Hyperion hyperspectral and IRS-P6 LISS-3 multispectral images of Kolkata city nearby area centered around 22º33′ N 88º26′ E. The attenuation coefficient of water was found to change with fine resolution of wavebands and in presence of suspended organic matter in water.

Keywords: hyperion, hyperspectral, Kolkata, water depth

Procedia PDF Downloads 247
10900 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 161
10899 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 409
10898 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality

Authors: Mduduzi Nhlozi

Abstract:

Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.

Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude

Procedia PDF Downloads 121
10897 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 143
10896 Determination of Optimum Water Consumptive Using Deficit Irrigation Model for Barely: A Case Study in Arak, Iran

Authors: Mohsen Najarchi

Abstract:

This research was carried out in five fields (5-15 hectares) in Arak located in center of Iran, to determine optimum level of water consumed for Barely in four stages growth (vegetative, yield formation, flowering, and ripening). Actual evapotranspiration was calculated using measured water requirement in the fields. Five levels of water requirement equal to 50, 60, 70, 80, and 90 percents formed the treatments. To determine the optimum level of water requirement linear programming was used. The study showed 60 percent water requirement (40 percent deficit irrigation) has been the optimum level of irrigation for winter wheat in four stages of growth. Comparison between all of the treatments indicated above with normal condition (100% water requirement) shows increasing in water use efficiency. Although 40% deficit irrigation treatment lead to decrease of 38% in yield, net benefit was increasing in 11.37%. Furthermore, in comparison with normal condition, 70% of water requirement increased water use efficiency as 30%.

Keywords: optimum, deficit irrigation, water use efficiency, evapotranspiration

Procedia PDF Downloads 397
10895 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review

Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park

Abstract:

Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.

Keywords: delta regions, coastal, food security, indicators, systematic review

Procedia PDF Downloads 243
10894 Seepage Modelling of Jatigede Dam Towards Cisampih Village Based on Analysis Soil Characteristic Using Method Soil Reaction to Water, West Java Indonesia

Authors: Diemas Purnama Muhammad Firman Pratama, Denny Maulana Malik

Abstract:

Development of Jatigede Dam that was the mega project in Indonesia, since 1963. Area of around Jatigede Dam is complex, it has structural geology active fault, and as possible can occur landslide. This research focus on soil test. The purpose of this research to know soil quality Jatigede Dam which caused by water seepage of Jatigede Dam, then can be made seepage modelling around Jatigede Dam including Cisampih Village. Method of this research is SRW (Soil Reaction to Water). There are three samples are taken nearby Jatigede Dam. Four paramaters to determine water seepage such as : V ( velocity of soil to release water), Dl (Ability of soil to release water), Ds (Ability of soil to absorb water), Dt (Ability of soil to hold water). meanwhile, another proscess of interaction beetween water and soil are produced angle, which is made of water flow and vertikal line. Called name SIAT. SIAT has two type is na1 and na2. Each samples has a value from the first sample is 280,333(degree), the second 270 (degree) and the third 270 (degree). The difference na1 is, water interaction towards Dt value angle, while na2 is water interaction towards Dl and Ds value angle. Result of calculating SRW method, first till third sample has a value 7, 11,5 and 9. Based on data, interpreted in around teritory of Jatigede Dam, will get easier impact from water seepage because, condition soil reaction too bad so, it can not hold water.

Keywords: Jatigede Dam, Cisampih village, water seepage, soil quality

Procedia PDF Downloads 376
10893 The Effect of Magnetic Water on the Growth of Radish Cherry

Authors: Elisha Didam Markus, Thapelo Maqame

Abstract:

This paper focuses on studying the effects of magnetism on water and their impact to plant growth. Magnetic fields are known to induce higher rate of biochemical reaction and therefore can be used for growth related reactions in plants. For the purpose of this study, two 2 litres bottles were taken, one with two opposite poles magnets (500 mT) one on top and one at the bottom of the bottle. Another bottle was not altered in any way (used as control). Each bottle contained tap water stored up for 24 hours. Plants planted into different pots were watered using water from these bottles. Four pots with soil and manure equally mixed were used and equal volume of radish berry seeds were planted. Two pots were watered with magnetised water and the other two with normal tap water. The developments of plants were monitored in terms of their lengths for a period of 21 days. After 21 days, the lengths of plants watered with magnetised water were found to be 5.6% longer than those watered with tap water.

Keywords: magnetised water, radish berry, growth percentage, magnetic fields

Procedia PDF Downloads 249
10892 The Relation of Water Intake with Level of Knowledge Related to Water Intake in Workers of Food Production Unit, Nutrition Installation at Puspa Hospital, Jakarta

Authors: Siti Rahmah Fitrianti, Mela Milani

Abstract:

Inadequate of water intake has negative effects on the health of the body, which can cause kidney failure and death. One of the factors that can affect someone intake of water is level of knowledge about the importance of water intake itself. A good knowledge of the daily water intake can increase the awareness of daily needed of water intake. Therefore, researchers initiated a study on the relationship of water intake to the level of knowledge related with water intake in food workers, at “Puspa” Hospital. Type of this research is quantitative research with cross-sectional approach. The research data was collected by measuring the independent and dependent variable at a time. This study took place in the food production unit of Nutrition Installation in "Puspa" Hospital, Jakarta in October 2016. The population target in this study were workers in food production unit aged 30-64 years. The instrument was a questionnaire question regarding water intake and 24 hours food recall. The result is 78.6% of respondents have less knowledge about the importance of water intake. Meanwhile, as many as 85.7% of respondents have adequate water intake. Tested by Chi-Square test, showed that no significant relationship between water intake with the level of knowledge related to water intake in workers of food production unit. Adequate intake of water in food workers commonly may be not caused by the level of knowledge related to water intake, but it may be cause of work environment factor which has a high temperature.

Keywords: food production unit, food workers, level of knowledge, water intake

Procedia PDF Downloads 350
10891 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 672
10890 A Study on Energy Efficiency of Vertical Water Treatment System with DC Power Supply

Authors: Young-Kwan Choi, Gang-Wook Shin, Sung-Taek Hong

Abstract:

Water supply system consumes large amount of power load during water treatment and transportation of purified water. Many energy conserving high efficiency materials such as DC motor and LED light have recently been introduced to water supply system for energy conservation. This paper performed empirical analysis on BLDC, AC motors, and comparatively analyzed the change in power according to DC power supply ratio in order to conserve energy of a next-generation water treatment system called vertical water treatment system. In addition, a DC distribution system linked with photovoltaic generation was simulated to analyze the energy conserving effect of DC load.

Keywords: vertical water treatment system, DC power supply, energy efficiency, BLDC

Procedia PDF Downloads 503
10889 Infection Risk of Fecal Coliform Contamination in Drinking Water Sources of Urban Slum Dwellers: Application of Quantitative Microbiological Risk Assessment

Authors: Sri Yusnita Irda Sari, Deni Kurniadi Sunjaya, Ardini Saptaningsih Raksanagara

Abstract:

Water is one of the fundamental basic needs for human life, particularly drinking water sources. Although water quality is getting better, fecal-contamination of water is still found around the world, especially in the slum area of mid-low income countries. Drinking water source contamination in urban slum dwellers increases the risk of water borne diseases. Low level of sanitation and poor drinking water supply known as risk factors for diarrhea, moreover bacteria-contaminated drinking water source is the main cause of diarrhea in developing countries. This study aimed to assess risk infection due to Fecal Coliform contamination in various drinking water sources in urban area by applying Quantitative Microbiological Risk Assessment (QMRA). A Cross-sectional survey was conducted in a period of August to October 2015. Water samples were taken by simple random sampling from households in Cikapundung river basin which was one of urban slum area in the center of Bandung city, Indonesia. About 379 water samples from 199 households and 15 common wells were tested. Half of the households used treated drinking water from water gallon mostly refill water gallon which was produced in drinking water refill station. Others used raw water sources which need treatment before consume as drinking water such as tap water, borehole, dug well and spring water source. Annual risk to get infection due to Fecal Coliform contamination from highest to lowest risk was dug well (1127.9 x 10-5), spring water (49.7 x 10-5), borehole (1.383 x 10-5) and tap water (1.121 x 10-5). Annual risk infection of refill drinking water was 1.577 x 10-5 which is comparable to borehole and tap water. Household water treatment and storage to make raw water sources drinkable is essential to prevent risk of water borne diseases. Strong regulation and intense monitoring of refill water gallon quality should be prioritized by the government; moreover, distribution of tap water should be more accessible and affordable especially in urban slum area.

Keywords: drinking water, quantitative microbiological risk assessment, slum, urban

Procedia PDF Downloads 281
10888 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 484
10887 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 159
10886 Approach to Study the Workability of Concrete with the Fractal Model

Authors: Achouri Fatima, Chouicha Kaddour

Abstract:

The main parameters affecting the workability are the water content, particle size, and the total surface of the grains, as long as the mixing water begins by wetting the surface of the grains and then fills the voids between the grains to form entrapped water, the quantity of water remaining is called free water. The aim is to undertake a fractal approach through the relationship between the concrete formulation parameters and workability, to develop this approach a series of concrete taken from the literature was investigated by varying formulation parameters such as G / S, the quantity of cement C and the quantity of mixing water E. We also call on other model as the model for the thickness of the water layer and model of the thickness of the paste layer to judge their relevance, hence the following results : the relevance of the model of the thickness of the water layer is considered relevant when there is a variation in the water quantity, the model of the thickness of the layer of the paste is only applicable if we consider that the paste is made with the grain value Dmax = 2.85: value from which we see a stable model.

Keywords: concrete, fractal method, paste thickness, water thickness, workability

Procedia PDF Downloads 380
10885 Preliminary Study on Using of Thermal Energy from Effluent Water for the SBR Process of RO

Authors: Gyeong-Sung Kim, In-soo Ahn, Yong Cho

Abstract:

SBR (Sequencing Batch Reactor) process is usually applied to membrane water treatment plants to treat its concentrated wastewater. The role of SBR process is to remove COD (Chemical Oxygen Demand) and NH3 from wastewater before discharging it outside of the water treatment plant using microorganism. Microorganism’s nitrification capability is influenced by water temperature because the nitrification rate of the concentrated wastewater becomes ‘zero’ as water temperature approach 0℃. Heating system is necessary to operate SBR in winter season even though the operating cost increase sharply. The operating cost of SBR at ‘D’ RO water treatment plant in Korea was 51.8 times higher in winter (October to March) compare to summer (April to September) season in 2014. Otherwise the effluent water temperature maintained around 8℃ constantly in winter. This study focuses on application heat pump system to recover the thermal energy from the effluent water of ‘D’ RO plant so that the operating cost will be reduced.

Keywords: water treatment, water thermal energy, energy saving, RO, SBR

Procedia PDF Downloads 516
10884 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 540
10883 Energy Consumption in China’s Urban Water Supply System

Authors: Kate Smith, Shuming Liu, Yi Liu, Dragan Savic, Gustaf Olsson, Tian Chang, Xue Wu

Abstract:

In a water supply system, a great deal of care goes into sourcing, treating and delivering water to consumers, but less thought is given to the energy consumed during these processes. This study uses 2011 data to quantify energy use for urban water supply in China and investigates population density as a possible influencing factor. The objective is to provide information that can be used to develop energy-conscious water infrastructure policy, calculate the energy co-benefits of water conservation and compare energy use between China and other countries. The average electrical energy intensity and per capita electrical energy consumption for urban water supply in China in 2011 were 0.29 kWh/m3 and 33.2 kWh/cap•yr, respectively. Comparison between provinces revealed a direct correlation between energy intensity of urban water supply and population served per unit length of pipe. This could imply energy intensity is lower when more densely populated areas are supplied by relatively dense networks of pipes. This study also found that whereas the percentage of energy used for urban water supply tends to increase with the percentage of population served this increase is slower where water supply is more energy efficient and where a larger percentage of population is already supplied.

Keywords: china, electrical energy use, water-energy nexus, water supply

Procedia PDF Downloads 498
10882 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 132
10881 Optimizing Water Consumption of a Washer-Dryer Which Contains Water Condensation Technology under a Constraint of Energy Consumption and Drying Performance

Authors: Aysegul Sarac

Abstract:

Washer-dryers are the machines which can either wash the laundries or can dry them. In other words, we can define a washer-dryer as a washing machine and a dryer in one machine. Washing machines are characterized by the loading capacity, cabinet depth and spin speed. Dryers are characterized by the drying technology. On the other hand, energy efficiency, water consumption, and noise levels are main characteristics that influence customer decisions to buy washers. Water condensation technology is the most common drying technology existing in the washer-dryer market. Water condensation technology uses water to dry the laundry inside the machine. Thus, in this type of the drying technology water consumption is at high levels comparing other technologies. Water condensation technology sprays cold water in the drum to condense the humidity of hot weather in order to dry the laundry inside. Thus, water consumption influences the drying performance. The scope of this study is to optimize water consumption during drying process under a constraint of energy consumption and drying performance. We are using 6-Sigma methodology to find the optimum water consumption by comparing drying performances of different drying algorithms.

Keywords: optimization, 6-Sigma methodology, washer-dryers, water condensation technology

Procedia PDF Downloads 361
10880 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 416
10879 The Effect of Maritime Security on National Development in Nigeria

Authors: Adegboyega Adedolapo Ola

Abstract:

Globally, a country’s maritime security has a significant impact on its national development because it serves as a major source of a commercial contact and food supply. However, the country has been faced with a number of problems, such as piracy, kidnapping, illegal bunkering and oil theft. As such, the study examined the contribution and the relationship between maritime security and Nigeria’s development, as well as the prospects and challenges of maritime security in Nigeria. The study utilized a questionnaire and focused group discussion/interview as instruments for data collection. The method of analysis employed in the study is descriptive. A total of Three Hundred and Ninety (390) respondents were randomly selected. The result of the study showed that maritime security contributes to national development in Nigeria by guaranteeing food security in Nigeria, creating employment opportunities as well as increasing the Gross Domestic Product (GDP) of the economy. It was also found that maritime security is yet to provide sufficient support for national development in Nigeria. It is further established that it has prospects for development through the creation of employment opportunities, increase in foreign earnings, and fostering improved living standards for citizens. The study concluded that the high level of corruption, piracy and kidnapping, lack of political will by the government and the porosity of the Nigerian borders are serious obstacles, among others. In attempting to solve the problem of piracy and kidnapping in Nigerian maritime, to contribute to National development, it is primordial to address the cancer of corruption, poverty, and youth unemployment. In view of this, the study recommends: among other things, that the maritime industry should be well secured by removing its constraints/bottlenecks so as to enhance its contributions to national development.

Keywords: maritime security, national development, terrorism, piracy

Procedia PDF Downloads 82
10878 A Novel Approach for the Analysis of Ground Water Quality by Using Classification Rules and Water Quality Index

Authors: Kamakshaiah Kolli, R. Seshadri

Abstract:

Water is a key resource in all economic activities ranging from agriculture to industry. Only a tiny fraction of the planet's abundant water is available to us as fresh water. Assessment of water quality has always been paramount in the field of environmental quality management. It is the foundation for health, hygiene, progress and prosperity. With ever increasing pressure of human population, there is severe stress on water resources. Therefore efficient water management is essential to civil society for betterment of quality of life. The present study emphasizes on the groundwater quality, sources of ground water contamination, variation of groundwater quality and its spatial distribution. The bases for groundwater quality assessment are groundwater bodies and representative monitoring network enabling determination of chemical status of groundwater body. For this study, water samples were collected from various areas of the entire corporation area of Guntur. Water is required for all living organisms of which 1.7% is available as ground water. Water has no calories or any nutrients, but essential for various metabolic activities in our body. Chemical and physical parameters can be tested for identifying the portability of ground water. Electrical conductivity, pH, alkalinity, Total Alkalinity, TDS, Calcium, Magnesium, Sodium, Potassium, Chloride, and Sulphate of the ground water from Guntur district: Different areas of the District were analyzed. Our aim is to check, if the ground water from the above areas are potable or not. As multivariate are present, Data mining technique using JRIP rules was employed for classifying the ground water.

Keywords: groundwater, water quality standards, potability, data mining, JRIP, PCA, classification

Procedia PDF Downloads 431
10877 Physiological and Biochemical Based Analysis to Assess the Efficacy of Mulch under Partial Root Zone Drying in Wheat

Authors: Salman Ahmad, Muhammad Aown Sammar Raza, Muhammad Farrukh Saleem, Rashid Iqbal, Muhammad Saqlain Zaheer, Muhammad Usman Aslam, Imran Haider, Muhammad Adnan Nazar, Muhammad Ali

Abstract:

Among the various abiotic stresses, drought stress is one of the most challenging for field crops. Wheat is one of the major staple food of the world, which is highly affected by water deficit stress in the current scenario of climate change. In order to ensure food security by depleting water resources, there is an urgent need to adopt technologies which result in sufficient crop yield with less water consumption. Mulching and partial rootzone drying (PRD) are two important management techniques used for water conservation and to mitigate the negative impacts of drought. The experiment was conducted to screen out the best-suited mulch for wheat under PRD system. Two water application techniques (I1= full irrigation I2= PRD irrigation) and four mulch treatments (M0= un-mulched, M1= black plastic mulch, M2= wheat straw mulch and M4= cotton sticks mulch) were conducted in completely randomized design with four replications. The treatment, black plastic mulch was performed the best than other mulch treatments. For irrigation levels, higher values of growth, physiological and water-related parameters were recorded in control treatment while, quality traits and enzymatic activities were higher under partial root zone drying. The current study concluded that adverse effects of drought on wheat can be significantly mitigated by using mulches but black plastic mulch was best suited for partial rootzone drying irrigation system in wheat.

Keywords: antioxidants, leaf water relations, Mulches, osmolytes, partial root zone drying, photosynthesis

Procedia PDF Downloads 266
10876 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia

Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan

Abstract:

This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.

Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia

Procedia PDF Downloads 392
10875 Scenarios of Societal Security and Business Continuity Cycles

Authors: Jiří F. Urbánek, Jiří Barta

Abstract:

Societal security, continuity scenarios, and methodological cycling approach understands in this article. Namely, societal security organizational challenges ask implementation of international standards BS 25999-2 and global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity, and interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization systems, resulting to a crisis scene or even to a battle theater. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management, and overmastering in real environments.

Keywords: business continuity, societal security, crisis scenarios cycles, interoperability

Procedia PDF Downloads 385
10874 Assessment of Yield and Water Use Efficiency of Soybean under Deficit Irrigation

Authors: Meysam Abedinpour

Abstract:

Water limitation is the main challenge for crop production in a semi-arid environment. Deficit irrigation is a strategy that allows a crop to sustain some degree of water deficit in order to reduce costs and potentially increase income. For this goal, a field experimental carried out at Asrieh fields of Gorgan city in the north of Iran, during summer season 2011. The treatments imposed were different irrigation water regimes (i.e. W1:70, W2:80, W3:90, and W4:100) percent of field capacity (FC). The results showed that there was Significant difference between the yield and (WUE) under different levels of irrigation, excepting of soil moisture content at field capacity (W4) and 90% of field capacity (W3) on yield and water use efficiency (WUE). The seasonal irrigation water applied were (i.e. 375, 338, 300, and 263 mm ha-1) under different irrigation water treatments (100, 90, 80, 80 and 70%) of FC, respectively. Grain yield productions under treatments were 4180, 3955, 3640, and 3355 (kg ha-1) respectively. Furthermore, the results showed that water use efficiency (WUE) at different treatments were 7.67, 7.79, 7.74, and 7.75 Kg mm ha-1 for (100, 90, 80, and 70) per cent of field capacity, therefore the 90 % of FC treatment (W3) is recommended for Soybean irrigation for water saving. Furthermore, the result showed that the treatment of 90 % of filed capacity (W3) seemed to be better adapted to product a high crop yield with acceptable yield coupling with water use efficiency in Golestan province.

Keywords: deficit irrigation, water use efficiency, yield, soybean

Procedia PDF Downloads 470